05.08.2016 Views

Demystifying the Secure Enclave Processor

Lyj6k4

Lyj6k4

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Attack Surface: Hardware<br />

• Memory corruption attacks again data receivers<br />

on peripheral lines<br />

▫ SPI<br />

▫ I2C<br />

▫ UART<br />

• Side Channel/Differential Power Analysis<br />

▫ Stick to <strong>the</strong> A7 (newer ones are more resistant)<br />

• Glitching<br />

▫ Standard Clock/Voltage Methods<br />

▫ O<strong>the</strong>rs

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!